1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
zubka84 [21]
3 years ago
5

A company is executing a strategy to encrypt and sign all proprietary data in transit. The company recently deployed PKI service

s to support this strategy. Which of the following protocols supports the strategy and employs certificates generated by PKI? (Select THREE).
answer choices
S/MIME

TLS

SFTP

SAML

IPSec
Computers and Technology
1 answer:
Nadusha1986 [10]3 years ago
4 0

Answer:

S/MIME

TLS

SFTP

Explanation:

S/MIME (Secure/Multipurpose Internet Mail Extensions) is a protocol that is generally accepted for sending encrypted messages or sign them after encrypting.

TLS is also considered a cryptographic protocol that is known for providing safe and secure communication security over networks and are in most cases used for internet communications.

SFTP also known as SSH or Secure File Transfer Protocol is a network protocol that allows for the transfer, access, and management of files over reliable and secure data stream.

Hence, a company executing a strategy to encrypt and sign all proprietary data transit can use these 3 protocols.

You might be interested in
What is plagiarism?<br> EXPLAIN IT
gladu [14]

Plagiarism is when you copy someone's work and treat it like it's your own..

5 0
3 years ago
Read 2 more answers
To make sound decisions about information security, management must be informed about the various threats facing the organizatio
const2013 [10]

Answer:

The answer is A. True

Explanation:

It is the responsibility of management to be aware of the current and potential threats that the organization is facing or prone to face in the nearest future. The threats could be focused on data integrity, valuable information, applications, or human personnel.

Hence, to make adequate decisions on information security, the management must take an assessment of the current situation of the organization and make plans towards securing the organization.

8 0
3 years ago
Using underlining and italics at the same time is which of these? A. allowed but might be overkill B. always a good idea C. not
Alex777 [14]

A. Allowed but might overkill

6 0
3 years ago
Read 2 more answers
What are the document involved in E payment​
worty [1.4K]

An e-payment system is a way of making transactions or paying for goods and services through an electronic medium, without the use of checks or cash. ... As the world advances more with technology development, we can see the rise of electronic payment systems and payment processing devices.

8 0
3 years ago
Write a recursive function sumSquares(num) that given an integer num, returns the sum of squares of numbers from 1 to num. For e
ValentinkaMS [17]

Answer:

Here is the recursive function sumSquares(num) that takes an integer num as parameter and returns the sum of squares of numbers from 1 to num.

def sumSquares(num):

   if(num >= 0):  # checks if the value of num is less than or equal to 0

       if (num==0):  #if value of num is 0

           return 0  #returns 0 if value of num is 0

       else:  #if value of num is greater than 0

           return sumSquares(num - 1)+ num * num  #recursively calls the sumSquares method to return the sum of squares of numbers from 1 to num

   else:  # if a user enters a negative num

       (print("The number if not positive"))  #prints this message

       exit()  # exits after displaying that number if not positive message

#below print statement is used in order to check the working of the function        

print(sumSquares(3)) #calls function and passes value 3 for num

Explanation:

The program works as follows:

The function sumSquares(num) that takes an integer num as parameter and returns the sum of squares of numbers from 1 to num

The first if condition checks if value of num is positive. If this condition evaluates to true then the another if statement inside this if statement is executed which checks if the value of num is 0. If this condition evaluates to true then the program returns 0. However if this condition evaluates to false then the else part executes which has the following statement:

return sumSquares(num - 1) + num * num

For example num = 3

so the above recursive statement works as follows:

sumSquares(3-1) + 3 * 3

sumSquares(2) + 9

Note that the sumSquares() method is called again and the value 2 is passed as num. As 2 is greater than 0. So again the recursive statement executes:

sumSquares(2 - 1) + 2 * 2 + 9

sumSquares(1) + 4 + 9

sumSquares(1) + 13

sumSquare() method is called again and the value 1 is passed as num. As 1 is greater than 0. So again the recursive statement executes:

sumSquares(1 - 1) + 1 * 1 + 13

sumSquares(0) + 1 + 13

sumSquares(0) + 14

sumSquare() method is called again and the value 0 is passed as num

As the value of num=0 So the if (num == 0):  condition evaluates to true and the statement returns 0 executes which returns 0:

sumSquares(0) + 14

0 + 14

Hence the output is:

14

The screenshot of the program along with its output is attached.

4 0
3 years ago
Other questions:
  • The LTE (cellular telephone) standard supports only packet switching"". What cellular services are morst affected by this change
    15·1 answer
  • People with healthy media diets:
    12·1 answer
  • A ________ separates traditional voice telephone transmission from the data transmissions in the equipment located at the custom
    11·1 answer
  • PPE that should be used by every technician include all of the following, EXCEPT
    6·2 answers
  • The following code processes a file containing five positive numbers. What will the variable $result contain after the code is e
    13·1 answer
  • How many passes will it take to find the five in this list?
    14·2 answers
  • What one main difference between social media and traditional media such as television?
    12·2 answers
  • Because it manages all other software the computer which software is most important
    5·2 answers
  • Which of the following are pointers?
    9·1 answer
  • Anything a person writes or creates is __________
    6·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!